-
Essay / Networking Questions and Answers: Subnetting and Hub
Q1: - Identify and explain the advantages of subnetting? Answer: A subnet is a logical grouping of network devices. whose mention of which hosts are part of a subnet number is provided with the subnet and is divided into virtually defined sections of their respective networks, allowing the administrator to acquire numerous subnets of network. When there is an organization network divided into subnets, it can be connected to the Internet with a single shared network address. Subnets outside an organization can obtain multiple Internet matches between subnet masks and IP address ranges defined by mathematical formulas. Professionals use calculators subnet masks and mapping between addresses. The advantages of subnetting are as follows. Advantages of subnetting:-(1) Troubleshooting:- Troubleshooting is easier with the help of subnetting as it is easier to find a problem in a large network to a small network. (2) Security: Packets must be routed between subnets, this is what ensures the security of the network. By evaluating the security of network communications, network devices operate the same for each additional user. Sensitive subnet resources make it more difficult to implement security measures. It allows the deployment of another host or subnet firewall, critical functions such as security measures to ensure that the firewall allows this. These servers and other networks can be configured so that other subnets are accessible. (3) Invisible on the public Internet: implementing subnetworks so that the internal division of the network into subnetworks is only visible within the organization; organization to the rest of the Internet is still just one big flat network.(4) No need to request new IP addresses...... middle of paper ...... Internet Integrity Protocol Temporal Key (TKIP) for integrates WEP encryption techniques and advanced security to overcome most of its weaknesses. This is why data privacy is possible with the help of WPA security. Key management: - WPA is characterized by a generation system / Key management combines strong authentication and data confidentiality functions. Keys are created after successful authentication and through subsequent four-way negotiation between the station and the access point. Data Integrity: - TKIP includes a message integrity code at the end of each plain text message to ensure messages are counterfeit. In WPA, it includes encryption algorithms to protect data, cryptographic integrity checks to prevent message modification and replay, and dynamic key management algorithms. WPA describes the new concept of security association associated with 802.11.